{"id":34439,"date":"2020-04-16T15:30:42","date_gmt":"2020-04-16T15:30:42","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/31125\/Kernel-Vulns-In-Android-Devices-Using-Qualcomm-Chips-Explored.html"},"modified":"2020-04-16T15:30:42","modified_gmt":"2020-04-16T15:30:42","slug":"kernel-vulns-in-android-devices-using-qualcomm-chips-explored","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/","title":{"rendered":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored"},"content":{"rendered":"<div><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/r\/2020\/04\/16\/814ffca6-cc2b-4de7-9ef1-58f4c6005637\/thumbnail\/770x578\/1a95917e10b621c098029b0af270e3ed\/screenshot-2020-04-16-at-14-38-12.png\" class=\"ff-og-image-inserted\"><\/div>\n<p>A detailed analysis of two critical vulnerabilities impacting Android devices powered by Qualcomm chips has been published.<\/p>\n<p>The two security flaws, tracked as <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-14040\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-14040<\/a> and <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2019-14041\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2019-14041<\/a>, affected all Android devices with Qualcomm chipsets and could be exploited to give a malicious application full root capabilities.&nbsp;<\/p>\n<p>Zimperium&#8217;s zLabs research team originally reported the security issues to Qualcomm on July 31, 2019. A proof-of-concept (PoC) was sent to the US chip giant on August 4, and a month later, Qualcomm sent patches to Android vendors.&nbsp;<\/p>\n<p>After vendors were given enough time to deploy the security fix to customers, a February <a href=\"https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\/february-2020-bulletin#_cve-2019-14040\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">security bulletin<\/a> was published by Qualcomm.&nbsp;<\/p>\n<p><strong>See also:&nbsp;<\/strong><a href=\"https:\/\/www.zdnet.com\/article\/make-sure-your-zoom-meetings-are-safe-by-doing-these-10-things\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zoom security: Your meetings will be safe and secure if you do these 10 things<\/a><\/p>\n<p>Now fixes have been made readily available, Zimperium has released PoC code to GitHub (<a href=\"https:\/\/github.com\/tamirzb\/CVE-2019-14040\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">1<\/a>, <a href=\"https:\/\/github.com\/tamirzb\/CVE-2019-14041\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">2<\/a>) and has <a href=\"https:\/\/blog.zimperium.com\/multiple-kernel-vulnerabilities-affecting-all-qualcomm-devices\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">given us an insight<\/a> into the kernel vulnerabilities.&nbsp;<\/p>\n<p>In the Android environment, a driver exists called QTI Secure Execution Environment Communicator (QSEECOM), which manages processes that need to communicate with the TrustZone.&nbsp;<\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_zd_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>The first vulnerability, CVE-2019-14041, is a race condition problem steeming from a buffer update function that is sent to the TrustZone with pointers.&nbsp;<\/p>\n<p>An API exposed by QSEECOM is made up of ioctls calls to the \/dev\/qseecom device. In order to prevent duplication, the buffer update function can be reached via two completely different ioctls and behaves differently in each scenario. While doing so, the function checks data-&gt;type, and simply by querying this call, it was possible to corrupt memory.&nbsp;<\/p>\n<p>The second vulnerability, CVE-2019-14040, is a use-after-free flaw in kernel memory mapping. Zimperium says the ION mechanism &#8212; used in mapping &#8212; &#8220;allows user-space processes to allocate memory out of special heaps which behave differently than other regular memory,&#8221; and as a result, it is not only user-space processes that can map or read\/write memory space.&nbsp;<\/p>\n<p>Instead, the same function that could be abused through the previous security flaw can also be used to ensure the kernel can also modify the same information.&nbsp;<\/p>\n<p><strong>TechRepublic:&nbsp;<\/strong><a href=\"https:\/\/www.techrepublic.com\/article\/scammers-exploit-coronavirus-for-business-email-compromise-campaigns\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Scammers exploit coronavirus for Business Email Compromise campaigns<\/a><\/p>\n<p>When an allocated ION buffer is referenced, some parameters including handles are saved. While requests are checked before proceeding, the team found that it was possible to extend the length of a request to the point that it was possible to bypass standard validity checks and compromise kernel mapping and code execution.&nbsp;<\/p>\n<p>The researchers say that when combined with an attack chain of other vulnerabilities &#8212; <a href=\"https:\/\/blog.zimperium.com\/cve-2017-13253-buffer-overflow-multiple-android-drm-services\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2017-13253<\/a>, <a href=\"https:\/\/blog.zimperium.com\/cve-2018-9411-new-critical-vulnerability-multiple-high-privileged-android-services\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-9411<\/a> and <a href=\"https:\/\/blog.zimperium.com\/cve-2018-9539-use-free-vulnerability-privileged-android-service\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\" data-component=\"externalLink\">CVE-2018-9539<\/a> &#8212; malicious apps can also seize root powers, leading to a range of attacks including sensitive data and credential theft, the deployment of additional malware, and surveillance including eavesdropping on private calls and taking control of a handset&#8217;s camera and microphone.&nbsp;<\/p>\n<p><strong>CNET:&nbsp;<\/strong><a href=\"https:\/\/www.cnet.com\/news\/zoom-every-security-issue-uncovered-in-the-video-chat-app\/?ftag=CMG-01-10aaa1b\" target=\"_blank\" rel=\"noopener noreferrer\" data-component=\"externalLink\">Zoom: Hackers reportedly put $500K price tag on latest security exploit<\/a><\/p>\n<p>&#8220;These vulnerabilities could allow an attacker to reach full root\/kernel privileges,&#8221; zLabs says. &#8220;Especially the use after free, as that one is way more reliable than the race condition. In theory, it could be possible for a completely unprivileged attacker to create a chain out of these vulnerabilities in order to achieve complete root privileges.&#8221;<\/p>\n<p><strong>Update 16.31 GMT<\/strong>: A Qualcomm spokesperson told ZDNet:<\/p>\n<p>&#8220;Providing technologies that support robust security and privacy is a priority for Qualcomm. Regarding the research published by Zimperium, we issued fixes to OEMs in November 2019 and have seen no evidence of exploitation. We commend the security researchers for using industry-standard coordinated disclosure practices, and we encourage end users to update their devices as patches become available from OEMs.&#8221;<\/p>\n<h3>Previous and related coverage<\/h3>\n<hr>\n<p><strong>Have a tip?<\/strong> Get in touch securely via WhatsApp | Signal at +447713 025 499, or over at Keybase: charlie0<\/p>\n<hr>\n<p>READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/31125\/Kernel-Vulns-In-Android-Devices-Using-Qualcomm-Chips-Explored.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":34440,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[8582],"class_list":["post-34439","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinehackermalwarephoneflawgoogle"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-16T15:30:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png\" \/>\n\t<meta property=\"og:image:width\" content=\"770\" \/>\n\t<meta property=\"og:image:height\" content=\"578\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Kernel Vulns In Android Devices Using Qualcomm Chips Explored\",\"datePublished\":\"2020-04-16T15:30:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\"},\"wordCount\":641,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png\",\"keywords\":[\"headline,hacker,malware,phone,flaw,google\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\",\"name\":\"Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png\",\"datePublished\":\"2020-04-16T15:30:42+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png\",\"width\":770,\"height\":578},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,hacker,malware,phone,flaw,google\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarephoneflawgoogle\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kernel Vulns In Android Devices Using Qualcomm Chips Explored\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/","og_locale":"en_US","og_type":"article","og_title":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-04-16T15:30:42+00:00","og_image":[{"width":770,"height":578,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored","datePublished":"2020-04-16T15:30:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/"},"wordCount":641,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png","keywords":["headline,hacker,malware,phone,flaw,google"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/","url":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/","name":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png","datePublished":"2020-04-16T15:30:42+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/04\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored.png","width":770,"height":578},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/kernel-vulns-in-android-devices-using-qualcomm-chips-explored\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,hacker,malware,phone,flaw,google","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinehackermalwarephoneflawgoogle\/"},{"@type":"ListItem","position":3,"name":"Kernel Vulns In Android Devices Using Qualcomm Chips Explored"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34439","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=34439"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/34439\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/34440"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=34439"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=34439"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=34439"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}